Bitdefender Top Ten E-Threats for October: Trojans Continue to Dominate E-Threat Rankings 4. November 2009 by Thomas Jannot The top spot on Bitdefender’s Top Ten list of e-threats for October is once again Trojan.Clicker.CM, which is mostly present on websites hosting illegal applications such as cracks, keygens and serial numbers for popular commercial software applications. It is typically used to force advertisements inside the browser and comprises 9.47 percent of infected files this …
Arcsight Logger 4: Log Management Solution Addresses Cyber-Crime 2. November 2009 by Thomas Jannot Arcsight, Inc. announced the fourth generation of its log management product Arcsight Logger 4. With more data, transactions and users online, organizations are increasingly vulnerable to fraud, theft and breaches due to hackers, malware, and malicious insiders. Arcsight Logger 4 helps organizations to detect, investigate and understand those incidents. The solution ought to reduce the …
ISACA ISRMC Europe: Practical Information on Information Security 30. October 2009 by Thomas Jannot ISACA, a not-for-profit governance and assurance association with more than 86,000 members worldwide, has introduced the Information Security and Risk Management Conference (ISRMC) Europe, which will be held at Grand Hotel Krasnapolsky in Amsterdam from 9.11. – 11.11.2009. The ISRMC features leading global security and web fraud experts and will build on and include the …
EC-Council Certified Ethical Hacker (C|EH) Program: Knowledge Offers Best Protection To Security Threats 28. October 2009 by Thomas Jannot A group of over 90 engineers from IBM Internet Security Systems (ISS) India recently completed the EC-Council Certified Ethical Hacker (C|EH) program. The Certified Ethical Hacker (C|EH) program ought to provide knowledge of different hacking tools and methodologies to engineers, who deploy this knowledge to test and improve the capability of products that they are …
Auconet Port Security Manager 2.0: Security Solution for Complex Networks 26. October 2009 by Thomas Jannot Berlin, Germany based Auconet presented Port Security Manager 2.0 at the SC World Congress in New York City. The solution ought to be the first IEEE-802.1X-compatible network access control management solution for vendor-independent high-level security in complex heterogeneous networks. According to Auconet the network management platform offers extensive security mechanisms and resource administration with pinpoint …
ISACA Shopping on the Job Survey: Employees Plan to Spend Two Work Days Shopping 21. October 2009 by Thomas Jannot Employees plan to spend nearly two full working days (14.4 hours) on average shopping online from a work computer this holiday season, according to a survey conducted on behalf of ISACA, a nonprofit association of 86,000 information technology (IT) professionals. One in 10 plans to spend at least 30 hours shopping online at work. Convenience …
Portwise 4.8: New Version Delivers Extended Cloud Security 16. October 2009 by Thomas Jannot Portwise announces the availability of the latest version 4.8 of the Portwise Identity and Access Management product suite. The version 4.8 ought to provide optimized, secure application access together with versatile authentication services for organizations and enterprises, thus enabling customers to securely embrace the promises of cloud computing. The new release is focused on extending …
IDC Worldwide Web Security Report: Scansafe Named Leader of SaaS Web Security Market 14. October 2009 by Thomas Jannot Scansafe today announced that it has been ranked as the worldwide market leader in SaaS Web security, according to influential market research firm IDC. New data within the recently released Worldwide Web Security 2009–2013 Forecast and 2008 Vendor Shares report show that Scansafe holds over 30 percent of the worldwide SaaS Web security market – …
AVG Link Scanner Solves Critical Social Network Hack 12. October 2009 by Thomas Jannot The popular practice of embedding shortened URL into Twitter tweets, Digg posts and other social networking communications is being threatened by hackers who use the anonymity of these URLs to hide poisoned web pages. According to AVG it’s Link Scanner is the only security tool available today that can detect the presence of these poisoned …
Cybercriminals Set to Ride Google’s Wave Says Imperva 9. October 2009 by Thomas Jannot As interest in Google’s Wave technology – the online giant’s successor to old-fashioned E-Mail – peaks, so hackers and scammers will inevitably ride the coat tails of Wave Web searches and attempt to divert Internet users to malicious and infected sites, says data security specialist Imperva.